<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Browser-Control — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/browser-control/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 20:15:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/browser-control/feed.xml" rel="self" type="application/rss+xml"/><item><title>camofox-mcp Unauthenticated HTTP MCP Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-05-camofox-mcp-unauth/</link><pubDate>Tue, 19 May 2026 20:15:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-camofox-mcp-unauth/</guid><description>camofox-mcp exposed an unauthenticated HTTP MCP endpoint, allowing remote clients to invoke browser-control tools without authentication, potentially leading to unauthorized browser automation and data access.</description><content:encoded><![CDATA[<p>The <code>camofox-mcp</code> package exposed a Streamable HTTP MCP endpoint at <code>/mcp</code> without requiring authentication. This vulnerability allows any client capable of reaching the <code>/mcp</code> endpoint to list and invoke browser-control tools. While the endpoint implemented rate limiting, it lacked proper inbound MCP-layer authentication. If <code>CAMOFOX_API_KEY</code> was configured, the server would forward this server-side key to the underlying <code>camofox-browser</code> backend, effectively allowing an unauthenticated MCP caller to leverage the server&rsquo;s browser authority without knowing the backend browser API key. The vulnerability existed in commit <code>10e3ac08cb50d830eb4ee00a789229f02f28a1a4</code> and was fixed in <code>v1.13.2</code> with commit <code>599f56ee40f8062aeca541c251ed1d39fb437f50</code>. This is a high severity issue, although default loopback-only deployments reduce the practical risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a <code>camofox-mcp</code> instance with HTTP mode enabled.</li>
<li>Attacker sends an HTTP POST request to the <code>/mcp</code> endpoint.</li>
<li>The server receives the request and creates a <code>StreamableHTTPServerTransport</code> without authentication.</li>
<li>The server connects to the transport and handles the request without validating client identity.</li>
<li>The attacker lists available browser-control tools via an MCP command.</li>
<li>The attacker invokes a browser-control tool, such as <code>create_tab</code> or <code>navigate</code>.</li>
<li>The server forwards the request to the <code>camofox-browser</code> backend, using the configured <code>CAMOFOX_API_KEY</code>.</li>
<li>The backend executes the command, potentially allowing unauthorized browser automation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>An unauthenticated client reaching the HTTP MCP endpoint can control the MCP server&rsquo;s browser tools. Successful exploitation can lead to unauthorized page navigation, tab creation, interaction with authenticated browser contexts, screenshot and content observation, and other browser-automation actions. The vulnerability poses a significant risk when HTTP mode is exposed for remote clients or deployed through Docker/reverse-proxy configurations, particularly if operators assume <code>CAMOFOX_API_KEY</code> protects the entire control plane.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>camofox-mcp</code> to version <code>v1.13.2</code> or later to incorporate the fix described in the fix notes.</li>
<li>Deploy the following Sigma rule to detect unauthenticated requests to the <code>/mcp</code> endpoint.</li>
<li>Review <code>camofox-mcp</code> configurations to ensure that HTTP mode is not exposed without proper authentication mechanisms in place.</li>
<li>Monitor webserver logs for HTTP POST requests to <code>/mcp</code> (log source: webserver) originating from unexpected IP addresses.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>unauthenticated-access</category><category>browser-control</category><category>web-application</category></item></channel></rss>